I installed bt4 beta on a macbook pro (not the latest unibody but the latest 17" before unibody version). I benchmarked a wpa attack with aircrack-ng
and got about 1000 Keys/s. I did the same with cowpatty and got about 100 Keys/s.

For THIS benchmark I didn´t used any FPGA.

But how can this huge difference between aircrack and cowpatty be explained?
Am I missing something?

Best,
Jörg

03-05-2009, 01:24 PM

cob4lt

Why you need 1000 keys or 100 keys when you only need for wpa a 4 way handshake?

03-05-2009, 09:43 PM

imported_Joerg

Funny, i thought i asked something.
Anyone can answer my question?

Best,
Joerg

03-11-2009, 03:39 PM

RaginRob

@Joerg: Perhaps compiling cowpatty from source on your macbook results in optimized performance, you should also ensure you have the openssl libs installed as far as I remember.

@cob4lt: I think you missed the point, of course you need the handshake but the cracking itself requires running aircrack or cowpatty. In the best case the essid is very common and you have a precomputed cowpatty table for it.